25 juillet 2019 | Local, Naval

U.S. Navy, Coast Guard, Royal Canadian Navy Conduct Tri-Party Staff Talks

HALIFAX, Nova Scotia (NNS) -- Members of Commander, U.S. 2nd Fleet staff and the U.S Coast Guard Atlantic Area Command joined Canadian Armed Forces' Joint Task Force Atlantic for the 2019 Tri-Party Staff Talks at Canadian Armed Forces Base Halifax, Nova Scotia, July 18-20.

This year's staff talks culminated with Commander, U.S. 2nd Fleet (C2F) taking the lead role for the staff talks, as well as Frontier Sentinal, the yearly exercise conducted by the U.S. Navy, U.S. Coast Guard, and Royal Canadian Navy. The tri-party rotates acting as the lead for the exercise every two years. Until the reestablishment of C2F in 2018, U.S. Fleet Forces command represented the U.S. Navy in the cohort.

The talks evaluated the joint organizations' ability to conduct inter-organizational communications at the operational and tactical levels, achieve and maintain shared maritime domain awareness, and conduct collaborative operational planning. All groups will be required to identify any problems, considerations, constraints, and restraints they are likely to encounter within this scenario.

Honing these skills is increasingly important as U.S. 2nd Fleet steps into the role previously occupied by U.S. Fleet Forces Command.

“I consider our tri-party relationship to be foundational to 2nd Fleets ability to effectively operate,” said Vice Adm. Andrew Lewis, commander U.S. 2nd Fleet. “We need to be seamless in scenario in order to effectively work together in real world operations. We must transcend interoperability to complete integration between our organizations.”

Frontier Sentinel is an annual exercise between all three organizations that serves as the cornerstone for validating the interoperability of the tri-party commands and tactical assets, highlighting challenges to interoperability and identifying solutions.

https://www.navy.mil/submit/display.asp?story_id=110346&utm_source=phplist3026&utm_medium=email&utm_content=HTML&utm_campaign=Headlines

Sur le même sujet

  • U.S. should follow Canada's lead in placing far right groups on terror list, says report

    15 octobre 2019 | Local, Sécurité

    U.S. should follow Canada's lead in placing far right groups on terror list, says report

    DAVID PUGLIESE, OTTAWA CITIZEN The U.S. should follow Canada's lead in putting far-right extremist groups on its list of outlawed terrorist organizations, a new report on the danger of the white supremacist movement recommends. There is also a growing trend for white supremacist groups to seek military training and experience in foreign conflicts, particularly in Ukraine, warns the New York-based Soufan Center in its report “White Supremacy Extremism: The Transnational Rise of The Violent White Supremacist Movement. U.S. government efforts to fight white supremacy extremism (WSE) are lacking despite the increasing danger it poses, the report pointed out. “White supremacy extremism is a transnational challenge — its tentacles reach from Canada to Australia, and the United States to Ukraine – but it has evolved at a different pace in different parts of the world,” noted the report. “To make serious progress, the United States should consider building upon Canada and the United Kingdom's leadership by sanctioning transnational WSE groups as foreign terrorist organizations.” The report specifically pointed to Canadian efforts against the international neo-Nazi network called Blood & Honor. In June, Canada for the first time added right-wing extremist groups to its list of terrorist organizations. Blood & Honor as well as its armed branch, Combat 18, which has carried out murders and bombings around the world, were both put on the list. Blood & Honor was founded in the United Kingdom in the late 1980s but has supporters in Canada. By designating white supremacist groups as international terrorists, the U.S. government could hinder the travel of their members and prosecute individuals for providing material support to designated groups. In 2018 white supremacist extremists were connected to 50 murders in the U.S. The Soufan Center, created by former FBI agent Ali Soufan who was involved in a number of counter-terrorism cases, also warned white nationalists have been traveling to Ukraine to learn combat skills. Such recruits are on both sides of the conflict between Ukraine and pro-Russian separatists and an estimated 17,000 foreigners from 50 countries have gone to fight in that war, it added. “In Ukraine, the Azov Battalion has recruited foreign fighters motivated by white supremacy and neo-Nazi beliefs, including many from the West, to join its ranks and receive training, indoctrination, and instruction in irregular warfare,” the report outlined. The Azov Battalion has been formerly incorporated into the Ukrainian military, at least in theory, the report added. But the battalion has cultivated a relationship with members of the Atomwaffen Division, a U.S.-based neo-Nazi terrorist network. In late September police arrested a U.S. Army soldier in Kansas for allegedly sharing bomb-making instructions online and discussing attacks on the news media, left-leaning activists and former U.S. Congressman Beto O'Rourke. The soldier, Jarrett William Smith, was interested in joining the Azov Battalion in Ukraine, according to the FBI. He was corresponding with another man in Texas who had fought in Ukraine for a right-wing extremist organization. In June 2018 Canadian government and military officials in Ukraine met with members of the Azov Battalion, which earlier that year had been banned by the U.S. Congress from receiving American arms because of its links to neo-Nazis The Canadians were photographed with battalion members, images which were shared on the unit's social media site In a statement to this newspaper Department of National Defence spokesman Dan Le Bouthillier said the meeting was planned by Ukrainian authorities and Canadian representatives had no prior knowledge of those who would be invited. “Canada has not, does not, and will not be providing support to Azov and affiliated entities,” Le Bouthillier said. “Canada is strongly opposed to the glorification of Nazism and all forms of racism, racial discrimination, xenophobia, intolerance and extremism.” The Soufan Center report also noted that Russian neo-Nazis have links with white supremacists in western nations. On the other side of the conflict in Ukraine, Russian groups like the Russian Imperial Movement and its paramilitary unit have also attracted and trained foreign fighters motivated by white supremacy and neo-Nazi beliefs, the report added. https://ottawacitizen.com/news/national/defence-watch/us-should-follow-canadas-lead-in-placing-far-right-groups-on-terror-list-says-report

  • Aligning the Air Force for 2035: An exclusive Q&A with LGen Eric Kenny

    2 décembre 2022 | Local, Aérospatial

    Aligning the Air Force for 2035: An exclusive Q&A with LGen Eric Kenny

    Skies recently sat down with LGen Kenny, the commander of the Royal Canadian Air Force, to discuss a variety of topics including acquisition projects, the personnel shortage, and the Air Force 2035 strategy.

  • Online 'phishing' attacks expected to target housebound staffers as COVID-19 spreads

    17 mars 2020 | Local, C4ISR, Sécurité

    Online 'phishing' attacks expected to target housebound staffers as COVID-19 spreads

    It's a 'huge opportunity' for online crime, one expert warns The number of "phishing" attacks meant to steal the online credentials of public servants and corporate sector employees now housebound due to the COVID-19 pandemic is on the rise, one cyber security expert warns. Many attempts are being made against employees who are working from home on virtual private works (VPNs). Cyber experts are still gathering data to establish a direct correlation between the pandemic crisis and the increase in malicious activity. But Rafal Rohozinski, chief executive officer of the SecDev Group of Companies, said this pandemic moment — when large numbers of employees are at home and receiving instructions from their workplaces on how to connect to internal networks — offers online thieves a "huge opportunity." Federal government and corporate sector systems were never designed to support a sudden, mass migration of employees from offices to their homes, he said. "The opening that creates for those who want to wreak havoc through ransomware and malware is really, really significant," said Rohozinski. "And I don't think we're anywhere near prepared for that. "What we're seeing is an increase in phishing being used as a means to get people's credentials." U.S. Health Department attacked The U.S. Health and Human Services Department's website was hit by a cyber attack over several hours on Sunday, an incident which involved overloading its servers with millions of hits. Officials said the system was not penetrated, although media reports in Washington described it as an attempt to undermine the U.S. government's response to the coronavirus pandemic — and may have been the work of a foreign actor. Rohozinski said that while the facts are not all in yet, his "professional guess" is that there's a link between the attack and the COVID-19 crisis. Last week, Canada's top military commander warned that he'd seen recent indications the country's adversaries intend to exploit the uncertainty, confusion and fear generated by the pandemic. Send in the trolls: Canada braces for an online disinformation assault on COVID-19 Gen. Jonathan Vance, chief of the defence staff, was not specific about the potential threats — but experts say they could range from hacking to online disinformation campaigns aimed at discrediting the federal government's response. Rohozinski said he's concerned about the federal government's technical capacity to support thousands of employees on private networks. "Everybody's moving on to VPNs. Everybody," he said. "This is an enormous pinpoint and an enormous vulnerability." Federal Digital Government Minister Joyce Murray's office was asked for a response Monday, but was unable to provide an immediate comment. Many of the country's leading information technology companies are part of the Canadian Cyber Threat Exchange (CCTE), a nonprofit centre where companies can swap information and insights. A CCTE spokeswoman said the corporate sector is better prepared to face the challenges posed by the mass movement of employees to home networks. Canada to bar entry to travellers who are not citizens, permanent residents or Americans Canadian military bans international travel in response to COVID-19 Still, there is reason for concern. "Given we are moving people to work from home now, companies need to ensure that the work from home environment is as safe as the corporate environment and that people are trained to notice these phishing campaigns, just like they were in the corporate environment," said Mary Jane Couldridge, director of business development at the CCTE. "It's a matter of keeping our community aware of what is impacting Canada daily so we know how to react to it and prevent it from spreading — and not chase rainbows." Most corporations have plans they'll activate now to cover the wholesale movement of employees to networks outside of the office, she added. https://www.cbc.ca/news/politics/online-hacking-phishing-covid-19-coronavirus-1.5499725

Toutes les nouvelles